期刊文献+

匿名系统中统计命中集攻击研究

Research on Statistical Hitting Set Attack in Anonymity System
下载PDF
导出
摘要 基于MIX匿名系统模型,提出一种改进的统计命中集攻击算法,并在该算法的基础上给出基于填充包的防御策略。理论分析和实验结果表明,与已有的统计命中集攻击相比,该攻击在接收者相对集中时有较好的攻击效果,采用填充包技术能有效地降低攻击的准确性。 This paper proposes an improved Statistical Hitting Set attack(SHS-attack) based on MIX anonymity technique and a defence strategy based on dummy packets to counter against this attack. Theoretical analysis and simulations show that, this attack is more efficient than previous SHS-attack while all the recipients congregate in a small group and the dummy packet technique can effectively decrease the accuracy of this attack.
出处 《计算机工程》 CAS CSCD 北大核心 2009年第2期145-147,共3页 Computer Engineering
基金 湖南省科技计划基金资助项目(20063342467) 湖南大学博士基金资助项目(521105255)
关键词 数据隐私 网络安全 匿名通信 统计命中集攻击 data privacy network security anonymous communications Statistical Hitting Set attack(SHS-attack)
  • 相关文献

参考文献5

  • 1徐红云,陈建二,陈松乔.匿名通信系统中统计型攻击模型研究[J].小型微型计算机系统,2004,25(11):1926-1929. 被引量:7
  • 2Kesdogan D, Agrawal D, Penz S. Limits of Anonymity in Open Environments[C]//Proc. of the 5th International Workshop on Information Hiding. Noordwijkerhout, Netherlands: [s. n.], 2002.
  • 3Danezis G Statistical Disclosure Attacks: Traffic Confirmation in Open Environments[C]//Proceedings of Security and Privacy in the Age of Uncertainty. Athens, Greece: [s. n.], 2003: 421-426.
  • 4Kesdogan D, Pimenidis L. The Hitting Set Attack on Anonymity Protocols[C]//Proceedings of the 6th Information Hiding Workshop. Toronto, Canada: [s. n.], 2004.
  • 5王伟平,皮润良,段桂华.匿名系统中统计暴露攻击及防御策略研究[J].计算机工程,2006,32(22):162-165. 被引量:4

二级参考文献13

  • 1Gilbert H, Chasse G. A statistical attack of the feal-8 cryptosystem[J]. Computer Science,1991, 537:22-33.
  • 2Andre L, M dos Santos. Statistical attack against Virtual Banks[R]. Reliable Software Group,University of California, 2000.
  • 3Reiter M K, Rubin A D. Crowds:anonymity for web transactions[J]. ACM Transactions on Information and System Security, 1998,1(1):62-92.
  • 4Stefan Savage, David Wetherall, Anna Karlin , Tom Anderson. Practical network support for IP traceback[R]. Department of Computer Science and Engineering,University of Washington, Seattle. Technical Report UW-CSE-00-02-01
  • 5Micah Adler. Tradeoffs in probabilistic packet marking for IP traceback[D]. Department of Computer Science,University of Massachusetts, Amherst, November 9,2001.
  • 6Matsui M, Yamagishi A. Statistical attack on secret key cryptosystems[J]. Electronics and Communications in Japan Part Ⅲ-Fundamental Electronic Science, Sep. 1994, 77(9):61-72.
  • 7David C. Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms[J]. Communications of the ACM, 1981, 24(2): 84- 88.
  • 8Serjantov A, Sewell P. Passive Attack Analysis for Connection-based Anonymity Systems[C]. Proceedings of European Symposium on Research in Computer Security, 2003.
  • 9Dogan K, Dakshi A, Stefan E Limits of Anonymity in Open Environments[C]. Proceedings of information Hiding Workshop,2002.
  • 10George D. Better Anonymous Communications[D]. University of Cambridge, 2003.

共引文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部